Explore tweets tagged as #SysSec
LTESniffer by SysSec-KAIST https://t.co/ZhlIMmW4RB An Open-source LTE Downlink/Uplink Eavesdropper. ...Physical Downlink Control Ch PDCCH to obtain the Downlink Control Info DCIs & Radio Network Temporary Identifiers RNTIs #SoftwareDefinedRadio #SDR
#LTE #Sniffer #Eavesdropper
0
12
50
LTESniffer An Open-source LTE Downlink/Uplink Eavesdropper. https://t.co/8xWhamIWfO
#cybersecurity #infosec #pentesting
3
80
311
Big News for DCG-91124 by DEF CON Group Gurugram We’re excited to welcome Aravind C. Ajayan (Sr. Security Engineer @ Philips | OSCP | IEEE/Springer Researcher) to our Review Board! Pentesting, AD, & hardened syssec pro — a huge milestone for us 🙌
0
0
1
LTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper : https://t.co/hYXLI7nRnz Paper : https://t.co/2uK14NhN3D
3
62
203
Just arrived straight from Italy! @rfnotmagic Now I just hear this project https://t.co/5MCLcYgLqm whispering “please support dual Lime RFNM daughterboards for uplink/downlink simultaneous LTE sniffing…” 🙏
8
13
168
"LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper" #infosec #pentest #redteam
https://t.co/oDDbzqXKpD
0
30
57
1️⃣ Huawei × Octa Huawei directly intersect Octa via: – PKU–Octa seminar (May 2024): Tan Yin, Huawei 2012 Labs (AI, security, Noah’s Ark Lab) SysSec Director present. – Huawei Cloud Marketplace: Octa listed as verified vendor. – Certifications: Octa’s TEE got Kunpeng Validated
1
3
20
LTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper - https://t.co/9jEvofB6NL
#MobileSecurity #DFIR #bugbountytips
0
1
7
4 baseband CVEs @ KAIST SysSec Jan24 '24: CVE-2023-32890 MediaTek @cheoljun_p @Spittfires_ Dec23 '23: CVE-2023-37366 Samsung Exynos @cheoljun_p @Spittfires_ Jun23 '22: CVE-2022-40521 Qualcomm Snapdragon @cheoljun_p Jun23 '22: CVE-2022-40536 Qualcomm Snapdragon @cheoljun_p 🧵
2
12
62
@RanolP_777 참고: https://t.co/HEjgO7zWMz 실제로 해보신 분 1 (2019) https://t.co/owUQ4Cmmlk 실제로 해보신 분 2 (2022)
0
25
25
SDRデバイスとしてUSRP X310が推奨 FDD LTEの上り下り両方を見るために2RX必要。ダウンリンクだけならB210でも動く GitHub - SysSec-KAIST/LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
1
1
4
GitHub - SysSec-KAIST/LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
0
6
28
LTESniffer : un outil Open Source permettant d'intercepter le trafic LTE en décodant les canaux de contrôle et de partage pour capturer les informations de liaison montante et descendante. 👉 Le code : https://t.co/klFVbgOmJh
2
13
40
(1/2) From the TLS newsletter: A group of researchers published their research into ticket-based TLS session resumption in a blog post titled “We Really Need to Talk About Session Tickets.” https://t.co/c0tTGRIojG
0
5
10
어떤 웹 사이트를 쓰려면 강제로 설치해야 하는 "보안 프로그램 설치", 사실 걔들이 구멍이야! 를 주장한 논문. 평소에 하고싶던 소리를 어떻게 이렇게 딱 집어서 연구했는지! kudos. https://t.co/TyxwQdGFXY 관련 비디오 ->
1
56
60
1) A ferramenta LTESniffer é uma ferramenta desenvolvida pelo SysSec Lab da KAIST (Instituto Avançado de Ciência e Tecnologia da Coreia). Ele é um eavesdropper* para comunicações LTE (4G e 4G+). Para baixar dados da rede wifi dos celulares. Não descriptografando. +
1
13
115
@cheoljun_p (CheolJun Park) and @hdtuanss (Tuan Hoang Dinh) at KAIST SysSec lab will give the following presentation at Qualcomm Product Security Summit 2024. "Finding memory bugs in the cellular baseband via over-the-air interface" https://t.co/TuovxINKBi
0
4
19